• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Business Intangible Asset Blog, Michael D. Moberly

Business Intangible Asset Blog where attention span, business realities, and solutions converge.

  • About Mr. Moberly
  • Intangible Assets
  • Business Services
    • Business Training Curriculum
    • Professional Service Firm Marketing
    • Media Appearances
  • Shop
    • Cart
  • Blog
  • Contact Mr. Moberly

Sage Advice For Safeguarding Businesses Intangible Assets…

September 6, 2012 1 Comment

I, and colleagues experienced in safeguarding businesses proprietary intangible assets…from compromise, misappropriation, and economic espionage, etc., recognize key challenges to achieve timely detection of materializing risks and quantifying losses in actual ‘dollar contexts’.

In part, methods a victim (company, organization, institution) may elect to…use to quantify a loss, should it become known, frequently pivot on one or more of the following inclinations and/or factors, e.g.,

  • ethnicity (country of origin) of the alleged perpetrator(s).
  • the perpetrators’ (insiders) position and level of trust.
  • victims’ perspective regarding the potential for experiencing reputation risk as a consequence relative to…
    • the nature-type of proprietary assets compromised.
    • if the data/information loss identified customers/clients personal information, and if
    • there is a legislative mandate to report any-all compromises, and
    • whether a victim company elects to (voluntarily) assign a dollar value to (quantify) their asset loss-compromise, and if so,
      • what methodology was used to arrive at the dollar value, i.e., where, what, and how data was collected and ultimately quantified?
  • the relative importance of the compromised intangible assets, i.e., their contributory role and value to R&D, a current project, potential breakthrough, and/or a contractual obligation.
  • the type of intangible assets compromised, i.e., proprietary and/or competitive advantage contributors – drivers to intellectual, structural, and/or relationship capital.
  • how and when the compromise-loss was detected-discovered.
  • are there immediate and/or strategic adverse consequences to a company’s value chain, investors, stakeholders, and brand, etc.
  • the perceived – proven motive(s) of the perpetrator(s) of the compromise.
  • if there are other-additional ‘end users’ (recipients) of the compromised assets, and are they economic, competitive advantage, or national security adversaries?

My counsel to business leadership is ‘avoid discounting any of the above too quickly’…it’s fair to suggest in today’s global, aggressively predatorial, and ‘winner take all’ business transaction environments…

  • that a strong and increasingly pervasive notion of ‘risk’ exist today that influence victim companies to characterize intangible asset losses in worst case scenario contexts, based variously on the factors, sentiments, and inclinations cited above.

In this context, there are numerous business operating realities I am consistently conscious…with respect to characterizing proprietary  intangible asset compromises and losses of U.S. businesses…

  • in most circumstances, unless mandated to do otherwise, it is often rationalized that it is seldom in the interest of business leadership and the sustainability of future transactions and supply chains…
  • particularly globally operating companies which strive to sustain amicable trading – transaction relationships, to be overly ‘public’ about ‘going public’ about asset compromises coupled with dollar value loss estimates.

Readers inclined to explore this phenomena further…would find it very useful insights about these issues authored by Drs. Julie Ryan and Theresa Jefferson (George Washington University) aptly titled ‘The Use, Misuse, and Abuse of Statistics in Information and Security Research’.

In this paper, the authors analyzed multiple, well known surveys that tout information asset security trends and losses. They make, in my judgment, a convincing argument that the…

  • findings are frequently anecdotal, not generalizable to leadership levels, and are often reported in a cumulative form. 
  • collectively, this suggests most findings may be unreliable for use by business leadership to justify the allocation or re-allocation of intangible asset safeguard resources.

NOTE: A special thanks to Dr. Julie Ryan (George Washington University) co-author to ‘The Use, Misuse, and Abuse of Statistics in Information and Security Research’ whom I met with on two occasions and came to be the inspiration for this post.

Michael D. Moberly m.moberly@kpstrat.com St. Louis (originally posted) September 6, 2012  the ‘Business Intangible Asset Blog’ since May 2006, 650+ posts, ‘where intangible assets, business, and effective solutions converge’.

I invite you to explore other relevant blog posts, video, books, and position papers at https://kpstrat.com/blog

Related Posts

  • Measuring Consequences of Economic Espionage...

    Company's economic consequences to acts of economic espionage.

  • CSO’s...Differences Between Information Security and Information Asset Protection!

    Chief Security Officers need to know the difference between information security and information asset protection.

  • Intangible Asset Risk Management - The 4G Of Information Asset Protection

    As more company's value and sources of revenue lie in intangible assets it will be…

Categories: Intangible Assets & Business Tags: Challenges to quantifying information asset losses., Dr. Julie Ryan, Economic espionage and loss of information assets., How companies quanify information asset losses., Quantifying dollar value of information asset losses., Theft of information assets., What companies need to know to quantify information asset losses., Why company's quantify information asset losses.

Reader Interactions

Comments

  1. Doug Laney says

    September 10, 2012 at 12:47 pm

    Fascinating topic Michael, and one I’ve been researching, writing and lecturing on for the past decade. One of the information valuation models I have developed incorporates the notion of information loss/cost in quantifying its economic value. It takes into consideration the cost of re-acquiring the information (if actually destroyed) and business discontinuity during the time it takes to recover it. Other methods adapt the income- and market-value approaches. For more on the theory and discipline of infonomics, see http://en.wikipedia.org/wiki/Infonomics, or my recent piece in Forbes: http://www.forbes.com/sites/gartnergroup/2012/05/22/infonomics-the-practice-of-information-economics/. –Doug Laney, VP Research, Gartner, @doug_laney

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Blog Posts Archive

Blog Categories

  • Business Reputation Risk & Mitigation
  • Global Intangibles
  • Intangible Assets & Business
  • Intangible Valuation & Monetization
  • Safeguarding Intangible Assets & IP
  • Uncategorized
  • LinkedIn

Copyright ©2022 · KPSTRAT

Copyright © 2022 · Genesis Sample on Genesis Framework · WordPress · Log in